tag:www.blogsofwar.com,2005:/feedBlogs of War2015-03-27T20:22:54-07:00tag:www.blogsofwar.com,2005:Article/132042015-03-27T20:22:54-07:002015-03-27T20:24:23-07:00http://blogsofwar.com/encryption-as-the-new-norm-discussing-a-changing-internet-with-protonmail-co-founder-andy-yenEncryption as the New Norm: Discussing A Changing Internet with ProtonMail Co-Founder Andy Yen<p>Over the past couple of weeks I’ve been evaluating <a href="http://protonmail.ch">ProtonMail</a>. This service is part of a new generation of tools (most inspired by Edward Snowden) developed with the aim of delivering robust encrypted communications and file sharing to the widest possible audience.</p>
<p>Blogs of War readers know that I’m not an Edward Snowden fan, far from it in fact, but I do believe that we have to secure the applications and communication channels that now pervade our lives. Not because I’m worried about the NSA. Frankly I’m far more worried about every other threat. However, I’m also keenly aware of the terrorist and criminal threats we face and why law enforcement agencies and intelligence services (the friendly ones) are deeply concerned about bad actors having the ability to go dark.</p>
<p>There are well-intentioned people on both sides of the privacy debate (see <a href="http://covertcontact.com/2015/03/22/the-battle-between-encryption-and-mass-surveillance-with-former-fbi-agent-david-gomez-episode-18/">episode 18 with retired FBI agent David Gomez</a> for a law enforcement perspective) and Andy Yen, as a privacy advocate, makes a powerful case for making encrypted communication tools as widely available as possible.</p>
<p>For more from Andy I recommend his TED Talk “<a href="https://www.ted.com/talks/andy_yen_think_your_email_s_private_think_again?language=en">Think your email’s private? Think again</a>“.<br>
<br>
<a href="http://traffic.libsyn.com/blogsofwar/CovertContact019.mp3"><img src="https://silvrback.s3.amazonaws.com/uploads/6e67ffaf-4bc8-4d09-a79c-1efe8a69a6d4/click-to-play_large.png" /></a> <br>
<br>
<a href="https://itunes.apple.com/us/podcast/covert-contact-blogs-war-podcast/id926821798?mt=2">Subscribe to Covert Contact via iTunes</a><br>
<a href="http://covertcontact.com/feed/">Subscribe to Covert Contact via RSS</a><br>
<a href="http://twitter.com/covertcontact">Follow @CovertContact Twitter</a><br>
<a href="http://covertcontact.com">Check out the Covert Contact blog</a> </p>
2015-03-27T20:22:54ZBlogs of Wartag:www.blogsofwar.com,2005:Article/131842015-03-26T17:28:17-07:002015-03-26T17:28:17-07:00http://blogsofwar.com/espionage-among-alliesEspionage Among Allies<p><img alt="William Tucker" class="sb_float" src="https://silvrback.s3.amazonaws.com/uploads/fe67a084-c704-4f04-aac3-63b48fa897dc/wt2_large.jpg" /> <em>William serves as a senior security representative to a major government contractor where he acts as the Counterintelligence Officer, advises on counterterrorism issues, and prepares personnel for overseas travel. His additional duties include advising his superiors in matters concerning emergency management and business continuity planning. Mr. Tucker regularly writes on terrorism, intelligence (geopolitical/strategic), violent religious movements, and psychological profiling. Prior to his current position, Mr. Tucker served in the U.S. Army where he frequently briefed superior military officers in global terrorist movements and the modernization of foreign militaries. Additionally, he advised Department of Defense Police on domestic and international terrorist movements and trends in guerrilla attacks. Mr. Tucker received his B.A. and M.A. in Homeland Security (both with Honors from American Military University – AMU). You can follow William on Twitter at <a href="http://twitter.com/tuckerwj">@tuckerwj</a>.</em></p>
<p>It&#39;s expected that nations will collect intelligence. Much of it is open source, but other methods carry a certain weight because of sensitivity. Intelligence gathered from human sources are among the most sensitive of these collection methods. Some of this sensitive intelligence is shared among allies and the U.S. has intelligence sharing agreements on numerous levels with different nations. Frankly, it&#39;s quite complicated, but it&#39;s important to note that safeguards are put in place to protect sources and methods. What this means is that while intelligence may be shared the method by which it was acquired may not be. This is precisely why bigot lists - access rosters - are used. There is also professional courtesy among &quot;friendly agencies.&quot; Here&#39;s the thing, though, intelligence that is shared is bound by agreements not to be shared with nations not party to the agreement. Though there is little in the way of protecting information once it&#39;s shared, professional courtesy to abide by intelligence sharing agreements is expected. If it&#39;s discovered that the trust of the agreement was violated, then relations can take a hit and sharing agreements can be revised. This is one of the many issues counterintelligence analysts look at when trying to understand why a nation not privy to certain information has something that they shouldn&#39;t. This was evident in the Wall Street Journal piece yesterday that described Israeli collection on the U.S. as being discovered by Washington&#39;s own intelligence collection on Israel.</p>
<p>The U.S. is generally concerned with Israeli espionage and many who work <a href="http://covertcontact.com/2015/01/31/counterintelligence-william-j-tucker-breaks-down-the-challenges-episode-12/">counterintelligence</a> consider Israel to be the top collection threat in the Near East. Some in the media have taken this out of context and placed Israel as the top collection threat, but it&#39;s important to note that the threat is indeed regional. The high profile of U.S.-Israeli relations and the history of contentious espionage issues between the two nations often brings a lot of attention to any allegations of Israeli collection attempts. Israel and the U.S. do have an intelligence sharing agreement in place, but there are some things Israel may want or need that don&#39;t fall under that agreement. This is what often serves as the motivation for Israel to collect that information to fill intelligence gaps. For the U.S., this is unacceptable because Washington chose not to share information for a specific reason and now that it is in the hands of a foreign nation it becomes difficult to protect the sources and methods used to collect that intelligence in the first place. This was an element in the now infamous espionage case involving Jonathan Pollard. Pollard claimed that the intelligence he provided to Israel fell under the sharing agreement; however that was not his call to make. Furthermore, intelligence he provided to Israel wound up in the hands of the Soviet Union.</p>
<p>The <a href="http://www.blogsofwar.com/2011/01/07/jonathan-pollard-and-american-fairness-justice-and-mercy">Pollard affair</a> was the breakpoint in how Israel collected intelligence on the U.S. and caused a low in U.S. - Israeli relations. Embarrassment followed, but eventually Israel made changes to its intelligence community and swore to never repeat the Pollard incident. Of course this didn&#39;t mean that Israel would stop spying. After all, intelligence collection is a necessary element of statecraft. What changed was targeting and methods of targeting. United States would remain an intelligence target, but the methods used to collect that information would change. From the U.S. perspective, Washington would continue to collect on Israel to ensure its interests and information were protected. It didn&#39;t take the Snowden leaks to demonstrate that the U.S. spies on its allies. Turn about is fair game so to speak, but the practicality of collecting intelligence on allies and adversaries alike is vital and not necessarily vindictive.</p>
<p>In looking at this Wall Street Journal article covering the United States and Israel spying on one another over the Iranian negotiations there are a few things of note. First, when an article covering intelligence appears in the news and quotes unnamed officials it&#39;s important to remember that these anonymous officials aren&#39;t always anonymous. Or at least not as anonymous as one would think. People who are truly in the know can be few and far between, and those who can speak with authority are fewer still. In other words, if this was not an authorized leak, then it would not be too difficult to narrow down the individual responsible for unauthorized disclosure of information. Naturally there are exceptions to this, but the leaked information appears deliberate. Second, the article appears at a politically sensitive time for both nations. The United States and Israel are at a politically contentious standoff over the Iranian negotiations because of the high stakes for all parties involved. This article appears to be another salvo in the battle between Pres. Obama and Prime Minister Benjamin Netanyahu. Indeed, this seems to be a calculated release on the part of the White House. From an analytical standpoint much of the information presented in the article that was allegedly collected by the Israelis doesn&#39;t necessarily seem to have come from U.S. sources. Israel is widely known to be actively and aggressively collecting intelligence on Iran, thus it stands to reason that any details of the negotiations that the U.S. didn&#39;t disclose to its Middle Eastern allies could&#39;ve been collected from an Iranian source. Furthermore, Israel has ties with other western nations that are involved in the negotiations and some of these nations have provided details of the negotiations to the Israelis. In those cases, diplomacy, not espionage, would likely have been a source of much of the information. In short, while it is known that Israel collects intelligence on the U.S., at times aggressively, there were plenty of other sources of information available for exploitation. In light of how few examples were provided in the Wall Street Journal article by the anonymous official on how Israel collected the information on the United States, it would suggest that any information collected by the Israelis would have been used to confirm something they already knew.</p>
<p>One aspect that was a bit bothering was that some members of Congress seemed unconcerned that Israel was spying on the Iranian nuclear negotiations generally, or the U.S. specifically. Some members that were interviewed refused to view the intelligence collection as spying at all. This didn&#39;t seem to be a partisan view, either. Frankly, members of congress should always be concerned when a foreign nation or non-state entity engages in any sort of espionage against the U.S. Granted, everyone spies, and while that is important to accept and recognize, the U.S. also practices counterintelligence for a good reason. U.S. Secrets are secrets for a reason and they must be protected. Indeed, the legislative body has oversight of the intelligence community and one would hope that they&#39;d show more concern. All this being said, the nonchalance by some members of congress as discussed in a recent Daily Beast article didn&#39;t identify which members were briefed by the Israelis as suggested by the Wall Street Journal article that kicked off this whole controversy. There are many unanswered questions that still need to be addressed, but for now what we have read regarding espionage between the U.S. and Israel is nothing new and unlikely to change. What we do have is further evidence that everybody spies. Intelligence collection is vital to statecraft and that is a constant that <a href="http://www.blogsofwar.com/2013/10/30/william-tucker-everybody-spies-and-for-good-reason">simply won&#39;t change</a>. </p>
2015-03-26T17:28:17ZBlogs of Wartag:www.blogsofwar.com,2005:Article/131032015-03-22T21:56:04-07:002015-03-22T21:56:04-07:00http://blogsofwar.com/the-battle-between-encryption-and-mass-surveillance-with-former-fbi-agent-david-gomez
The Battle Between Encryption and Mass Surveillance with Former FBI Agent David Gomez<p>I emailed retired FBI agent David Gomez from my new <a href="http://protonmail.com">ProtonMail</a> account to propose a podcast about encryption and its effect on mass surveillance from a homeland security and law enforcement perspective. You’re reading this because he immediately accepted.</p>
<p>Encrypted communication has been available to consumers for decades but new tools are arriving that are actually making it an accessible and realistic option for the majority of users. Easy to use strong encryption is, in many ways, a wonderful thing. It means that good people in bad places might have more freedom to communicate. It means that people can trust that a point to point communication is just that. But it also means that a lot of people with bad intentions will find it easier to go dark, to plot, and to recruit – often across international borders. How are governments going to cope with this especially when they’ve enjoyed great success with the current collection models that allow them to intercept electronic communications on a massive scale?</p>
<p>Even if you support strong encryption and disagree with government interception of electronic communications you must acknowledge the impact that cutting them out of the loop could have on our security. That tradeoff is the topic we struggle with in this episode.</p>
<p>You can follow David on Twitter <a href="http://twitter.com/allthingshls">@AllThingsHLS</a>.<br>
<br>
<a href="http://traffic.libsyn.com/blogsofwar/CovertContact018.mp3"><img src="https://silvrback.s3.amazonaws.com/uploads/6e67ffaf-4bc8-4d09-a79c-1efe8a69a6d4/click-to-play_large.png" /></a> <br>
<br>
<a href="https://itunes.apple.com/us/podcast/covert-contact-blogs-war-podcast/id926821798?mt=2">Subscribe to Covert Contact via iTunes</a><br>
<a href="http://covertcontact.com/feed/">Subscribe to Covert Contact via RSS</a><br>
<a href="http://twitter.com/covertcontact">Follow @CovertContact Twitter</a><br>
<a href="http://covertcontact.com">Check out the Covert Contact blog</a> </p>
2015-03-22T21:56:04ZBlogs of War